Abstract
E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the government domain attempt to take the next step and exploit the latest wireless technologies in order to provide ubiquitous services for mobile users. However, this approach involves some hidden risks mainly due to the inherent insecurity of the air medium and the vulnerabilities of the wireless systems. Thus, in this paper we investigate the security gaps and considerations which should be taken into account for an m-government system. Finally, we provide a list of security guidelines and policies, which the users of the system should be aware of and follow in order to avoid security attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Technical Report CS-2003-05, Technion - Israel Institute of Technology (2003)
Bassara, A., Wiśniewski, M., Żebrowski, P.: USE-ME.GOV - Usability-driven open platform for mobile government. In: Proc. of Business Information Systems (BIS) 2005, Poznań, Poland, pp. 193–202 (2005a)
Bassara, A., Wiśniewski, M., Żebrowski, P.: USE-ME.GOV – A Requirements-driven Approach for M-Gov Services Provisioning. In: Proc. of Business Information Systems (BIS) 2005, Poznań, Poland, pp. 203–214 (2005b)
Beynon-Davies, P.: Constructing electronic government: the case of the UK inland revenue. International Journal of Information Management 25, 3–20 (2005)
Biham, E., Dunkelman, O.: Cryptanalysis of the A5/1 GSM Stream Cipher. In: Proc. of the First International Conference on Progress in Cryptology, pp. 43–51 (2000)
Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: The insecurity of 802.11. In: Proc. of the 7th annual International Conference on Mobile computing and networking, Rome, Italy, pp. 180–189 (2001)
Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., Zorn, G.: Point-to-Point Tunneling Protocol (PPTP), RFC 2637 (1999)
Jakobsson, M., Wetzel, S.: Security weaknesses in Bluetooth. In: Proc. of RSA Security Conference- Cryptographer’s Track. LNCS. Springer, Heidelberg (2002)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kumar, M., Hanumanthappa, M., Reddy, B.L. (2008). Security Issues in mGovernment. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds) Global E-Security. ICGeS 2008. Communications in Computer and Information Science, vol 12. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69403-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-540-69403-8_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69402-1
Online ISBN: 978-3-540-69403-8
eBook Packages: Computer ScienceComputer Science (R0)